SlideShare a Scribd company logo
1 of 21
Download to read offline
2
Encryption, protection,
passwords – these all help us in
keeping data safe whether
we’re making an online
transaction or sending a file.
If you would like to know where it all
began, encryption can be found as early
as the ancient Greek times where the
term “encryption” was known as
“kryptos” which literally means hidden
secret. Back then, computers we’re non-
existent so securing information required
skills and techniques that need to be
studied.
4
“
5
As time went by of course, cryptography also
grew, developed and changed which in the
20th century began growing with the
introduction of electronics.
6
By now, we know this process as encryption and
can publicly be added in any data file using
two inventions in 1970’s – Public-key
cryptography and Data Encryption Standard.
7
Here’s a detailed history in bullet form
8
9
1467: The Alberti Cipher was invented
by Leon Battista Alberti. It was known
as the first polyalphabetic cipher,
made out of two circular metals that
have mixed alphabets and attached
to one pin. The two wheels has an
uppercase letter on the outer and a
lowercase letter on the inner, rotates
in order to follow the formula and uses
“k” as its pointer. Now both the
receiver and the sender should have
the same kind of wheels and should
follow the formula. The formula starts
by the first uppercase letter written,
which indicates that it will be pointed
on the “k” and aligning them. The
encrypted message uses the small
letters and decrypting it would entail
following the big letters it is parallel to.
10
11
1940’s: Electronics were
introduced and the Enigma
Machine was invented. It was
made up of keyboard,
plugboard, lamp board, and
rotors. Each machine had rotors
with letters which they could
scramble to make it harder to
break the code. When a letter is
pressed, another letter lights up
as it corresponds to the setting
made. This was used by the Nazi
military back in World War 2.
12
1961: The first user
password was created
by MIT with Compatible
Time-Sharing System,
which confirms user
authentication.
1979: Data Encryption
Standard was finally
made! It was invented
by the National Bureau
of Standards using 56-
bit encryption. This
system was used for
over 20 years.
1997: Encryption was
developed into AES or also
known as Advanced
Encryption Standard. It
used 128-bit encryption
and is still used up to
present. This was also the
year that CAPTCHA was
born. Captcha was made
to avoid spams and
hackers.
13
“
14
1 2 3
14
“
–
15
Of course, it is! Our number one priority is to keep
your documents secure, which is why we keep our
servers encrypted and we automatically delete
your file after you process and save! So don’t worry
about having your documents exposed after
adding a passwords because we keep all
documents confidential.
16
Adding a password with our tools is completely free.
Yep, you heard it right! All of our tools are actually
free to use so if you need to edit, translate, convert
from PDF to word, merge multiple files, separate by
splitting pages, or perhaps make it into a ePUB, then
your tools are just right here at the HOMEPAGE.
17
Have other needs?
Look through our free
tools in our homepage
or look into our blog
for more details!
You can always stay updated with us, just
subscribe or follow our social media channels!
Subscribe by registering to our site!
Watch our video tutorials in YouTube
✓ Follow us on Facebook
✓ Follow us on Instagram
✓ Follow us on LinkedIn
✓ Follow us on Twitter
Click on the yellow links to go to the social media page
SlidesCarnival icons are editable shapes.
This means that you can:
● Resize them without losing quality.
● Change fill color and opacity.
● Change line color, width and style.
Isn’t that nice? :)
Examples:
20
✋👆👉👍👤👦👧👨👩👪💃🏃
💑❤😂😉😋😒😭👶😸🐟🍒
🍔💣📌📖🔨🎃🎈🎨🏈🏰🌏
🔌🔑 and many more...
😉
21
Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the color.
How? Follow Google instructions
https://twitter.com/googledocs/status/730087240156643328

More Related Content

Similar to How to encrypt your PDF - knowing your cryptography

Cryptography
CryptographyCryptography
Cryptographymilanmath
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34Lia s. Associates | Branding & Design
 
2600 v04 n09 (september 1987)
2600 v04 n09 (september 1987)2600 v04 n09 (september 1987)
2600 v04 n09 (september 1987)Felipe Prado
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Digital signature and digital identity
Digital signature and digital identityDigital signature and digital identity
Digital signature and digital identityEmanuele Cisbani
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
Pc magazine january 2015 usa
Pc magazine   january 2015  usaPc magazine   january 2015  usa
Pc magazine january 2015 usaNhóc Nhóc
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Being digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxBeing digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxHamzakhalid708089
 

Similar to How to encrypt your PDF - knowing your cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Homework1
Homework1Homework1
Homework1
 
Week12
Week12Week12
Week12
 
Webquest internet
Webquest internet Webquest internet
Webquest internet
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34
111 190518 Bookclub 100 Ideas That Changed The Web by Jim Boulton - Idea 1-34
 
Cryptography
CryptographyCryptography
Cryptography
 
2600 v04 n09 (september 1987)
2600 v04 n09 (september 1987)2600 v04 n09 (september 1987)
2600 v04 n09 (september 1987)
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
A Brief History Of Data
A Brief History Of DataA Brief History Of Data
A Brief History Of Data
 
Digital signature and digital identity
Digital signature and digital identityDigital signature and digital identity
Digital signature and digital identity
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Pc magazine january 2015 usa
Pc magazine   january 2015  usaPc magazine   january 2015  usa
Pc magazine january 2015 usa
 
Introduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey ManagementIntroduction PGP-GPG Subkey Management
Introduction PGP-GPG Subkey Management
 
無題 1
無題 1無題 1
無題 1
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Being digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxBeing digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptx
 

More from DeftPDF

Benefits of upgrading plans at DeftPDF
Benefits of upgrading plans at DeftPDFBenefits of upgrading plans at DeftPDF
Benefits of upgrading plans at DeftPDFDeftPDF
 
What is PDF/X?
What is PDF/X? What is PDF/X?
What is PDF/X? DeftPDF
 
What is PDF/A?
What is PDF/A?What is PDF/A?
What is PDF/A?DeftPDF
 
Different file types
Different file typesDifferent file types
Different file typesDeftPDF
 
How translation tools work
How translation tools workHow translation tools work
How translation tools workDeftPDF
 
How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalidDeftPDF
 
How to earn with ads
How to earn with adsHow to earn with ads
How to earn with adsDeftPDF
 
Characteristics of an accessible pdf
Characteristics of an accessible pdfCharacteristics of an accessible pdf
Characteristics of an accessible pdfDeftPDF
 
Correct the words on your PDF!
Correct the words on your PDF!Correct the words on your PDF!
Correct the words on your PDF!DeftPDF
 
Is PDF an open standard
Is PDF an open standardIs PDF an open standard
Is PDF an open standardDeftPDF
 
How to cite PDF properly
How to cite PDF properlyHow to cite PDF properly
How to cite PDF properlyDeftPDF
 
How to convert pdf to monochrome
How to convert pdf to monochromeHow to convert pdf to monochrome
How to convert pdf to monochromeDeftPDF
 
How to celebrate halloween in 2020
How to celebrate halloween in 2020How to celebrate halloween in 2020
How to celebrate halloween in 2020DeftPDF
 
How to celebrate halloween in 2020
How to celebrate halloween in 2020How to celebrate halloween in 2020
How to celebrate halloween in 2020DeftPDF
 
How to translate documents while keeping format
How to translate documents while keeping formatHow to translate documents while keeping format
How to translate documents while keeping formatDeftPDF
 
How to Resize PDF for book printing custom size
How to Resize PDF for book printing custom sizeHow to Resize PDF for book printing custom size
How to Resize PDF for book printing custom sizeDeftPDF
 
How to make your PDF read aloud
How to make your PDF read aloudHow to make your PDF read aloud
How to make your PDF read aloudDeftPDF
 
Difference between eSignature, digital signature and digital footprint
Difference between eSignature, digital signature and digital footprintDifference between eSignature, digital signature and digital footprint
Difference between eSignature, digital signature and digital footprintDeftPDF
 
How to add attachments to your PDF
How to add attachments to your PDFHow to add attachments to your PDF
How to add attachments to your PDFDeftPDF
 
Comparing Digital Files to Hard Copy
Comparing Digital Files to Hard CopyComparing Digital Files to Hard Copy
Comparing Digital Files to Hard CopyDeftPDF
 

More from DeftPDF (20)

Benefits of upgrading plans at DeftPDF
Benefits of upgrading plans at DeftPDFBenefits of upgrading plans at DeftPDF
Benefits of upgrading plans at DeftPDF
 
What is PDF/X?
What is PDF/X? What is PDF/X?
What is PDF/X?
 
What is PDF/A?
What is PDF/A?What is PDF/A?
What is PDF/A?
 
Different file types
Different file typesDifferent file types
Different file types
 
How translation tools work
How translation tools workHow translation tools work
How translation tools work
 
How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalid
 
How to earn with ads
How to earn with adsHow to earn with ads
How to earn with ads
 
Characteristics of an accessible pdf
Characteristics of an accessible pdfCharacteristics of an accessible pdf
Characteristics of an accessible pdf
 
Correct the words on your PDF!
Correct the words on your PDF!Correct the words on your PDF!
Correct the words on your PDF!
 
Is PDF an open standard
Is PDF an open standardIs PDF an open standard
Is PDF an open standard
 
How to cite PDF properly
How to cite PDF properlyHow to cite PDF properly
How to cite PDF properly
 
How to convert pdf to monochrome
How to convert pdf to monochromeHow to convert pdf to monochrome
How to convert pdf to monochrome
 
How to celebrate halloween in 2020
How to celebrate halloween in 2020How to celebrate halloween in 2020
How to celebrate halloween in 2020
 
How to celebrate halloween in 2020
How to celebrate halloween in 2020How to celebrate halloween in 2020
How to celebrate halloween in 2020
 
How to translate documents while keeping format
How to translate documents while keeping formatHow to translate documents while keeping format
How to translate documents while keeping format
 
How to Resize PDF for book printing custom size
How to Resize PDF for book printing custom sizeHow to Resize PDF for book printing custom size
How to Resize PDF for book printing custom size
 
How to make your PDF read aloud
How to make your PDF read aloudHow to make your PDF read aloud
How to make your PDF read aloud
 
Difference between eSignature, digital signature and digital footprint
Difference between eSignature, digital signature and digital footprintDifference between eSignature, digital signature and digital footprint
Difference between eSignature, digital signature and digital footprint
 
How to add attachments to your PDF
How to add attachments to your PDFHow to add attachments to your PDF
How to add attachments to your PDF
 
Comparing Digital Files to Hard Copy
Comparing Digital Files to Hard CopyComparing Digital Files to Hard Copy
Comparing Digital Files to Hard Copy
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

How to encrypt your PDF - knowing your cryptography

  • 1.
  • 2. 2 Encryption, protection, passwords – these all help us in keeping data safe whether we’re making an online transaction or sending a file.
  • 3.
  • 4. If you would like to know where it all began, encryption can be found as early as the ancient Greek times where the term “encryption” was known as “kryptos” which literally means hidden secret. Back then, computers we’re non- existent so securing information required skills and techniques that need to be studied. 4
  • 6. As time went by of course, cryptography also grew, developed and changed which in the 20th century began growing with the introduction of electronics. 6
  • 7. By now, we know this process as encryption and can publicly be added in any data file using two inventions in 1970’s – Public-key cryptography and Data Encryption Standard. 7
  • 8. Here’s a detailed history in bullet form 8
  • 9. 9
  • 10. 1467: The Alberti Cipher was invented by Leon Battista Alberti. It was known as the first polyalphabetic cipher, made out of two circular metals that have mixed alphabets and attached to one pin. The two wheels has an uppercase letter on the outer and a lowercase letter on the inner, rotates in order to follow the formula and uses “k” as its pointer. Now both the receiver and the sender should have the same kind of wheels and should follow the formula. The formula starts by the first uppercase letter written, which indicates that it will be pointed on the “k” and aligning them. The encrypted message uses the small letters and decrypting it would entail following the big letters it is parallel to. 10
  • 11. 11
  • 12. 1940’s: Electronics were introduced and the Enigma Machine was invented. It was made up of keyboard, plugboard, lamp board, and rotors. Each machine had rotors with letters which they could scramble to make it harder to break the code. When a letter is pressed, another letter lights up as it corresponds to the setting made. This was used by the Nazi military back in World War 2. 12
  • 13. 1961: The first user password was created by MIT with Compatible Time-Sharing System, which confirms user authentication. 1979: Data Encryption Standard was finally made! It was invented by the National Bureau of Standards using 56- bit encryption. This system was used for over 20 years. 1997: Encryption was developed into AES or also known as Advanced Encryption Standard. It used 128-bit encryption and is still used up to present. This was also the year that CAPTCHA was born. Captcha was made to avoid spams and hackers. 13
  • 16. Of course, it is! Our number one priority is to keep your documents secure, which is why we keep our servers encrypted and we automatically delete your file after you process and save! So don’t worry about having your documents exposed after adding a passwords because we keep all documents confidential. 16
  • 17. Adding a password with our tools is completely free. Yep, you heard it right! All of our tools are actually free to use so if you need to edit, translate, convert from PDF to word, merge multiple files, separate by splitting pages, or perhaps make it into a ePUB, then your tools are just right here at the HOMEPAGE. 17
  • 18. Have other needs? Look through our free tools in our homepage or look into our blog for more details!
  • 19. You can always stay updated with us, just subscribe or follow our social media channels! Subscribe by registering to our site! Watch our video tutorials in YouTube ✓ Follow us on Facebook ✓ Follow us on Instagram ✓ Follow us on LinkedIn ✓ Follow us on Twitter Click on the yellow links to go to the social media page
  • 20. SlidesCarnival icons are editable shapes. This means that you can: ● Resize them without losing quality. ● Change fill color and opacity. ● Change line color, width and style. Isn’t that nice? :) Examples: 20
  • 21. ✋👆👉👍👤👦👧👨👩👪💃🏃 💑❤😂😉😋😒😭👶😸🐟🍒 🍔💣📌📖🔨🎃🎈🎨🏈🏰🌏 🔌🔑 and many more... 😉 21 Now you can use any emoji as an icon! And of course it resizes without losing quality and you can change the color. How? Follow Google instructions https://twitter.com/googledocs/status/730087240156643328